← Volver a CVEs
CVE-2023-1895
HIGH8.5
Descripcion
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Detalles CVE
Puntuacion CVSS v3.18.5
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado6/9/2023
Ultima modificacion4/8/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
motopress:getwid
Debilidades (CWE)
CWE-918
Referencias
https://plugins.trac.wordpress.org/browser/getwid/tags/1.8.3/includes/rest-api.php(security@wordfence.com)
https://www.wordfence.com/blog/2023/06/credential-stealing-server-side-request-forgery-patched-in-getwid/(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c2a942-c14c-4b59-92a7-6946b2e4731b?source=cve(security@wordfence.com)
https://plugins.trac.wordpress.org/browser/getwid/tags/1.8.3/includes/rest-api.php(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c2a942-c14c-4b59-92a7-6946b2e4731b?source=cve(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.